Flipper Zero Unleashed Firmware
The first messaging platform operating without user identifiers
Shows how easy it would be to gain unauthorized access to a system
Application that automatically prepares Android APK files for HTTPS
C2 framework used to aid red teamers with post-exploitation
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
A tool to check web apps for vulnerabilty
Sokoban with many families of puzzles provided.
Klotsky class block slider puzzles.
Collection of reverse shells for red team operations
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
Windows memory hacking library
Scriptable network authentication cracker (formerly `badtouch`)
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Security tools that can be used to audit SIP based VoIP systems
Open source OWASP penetration testing tool written in Python 3
Sudomy is a subdomain enumeration tool to collect subdomains
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
A very secure file vault for private files to avoid hackers
Toolkit aimed to perform lateral movement in restricted environments